KimcilWare Ransomware Found Targeting Magento Websites
KimcilWare, a new ransomware was discovered using at least two different scripts to target websites using Magento, a a popular e-commerce platform.
KimcilWare targets websites and encrypts files linked to Magento, and appends the “.kimcilware” extension at the end of each file, which then renders the file useless—then demands a ransom payment. In addition, KimcilWare adds its own index.html to the server, printing out a ransom note that reads “Webserver Encrypted” as a headline and then a message that says “Your webserver files has been encrypted with a unix algorithm encryptor. You must paw[sic] 140$ to decrypt your webserver files. Payment via Bitcoin only. For more information contact me.” An email is also linked to a Windows ransomware called MireWare, which is based on Hidden Tear, a ransomware variant designed with encryption flaws to prevent abuse.
[READ: Ransomware code shared for “educational purposes”]
Another variant of this ransomware appends “.locked” extension to encrypted files and demands a ransom payment of 1 Bitcoin ($415) for a decrypt key. Based on further findings, the ransomware uses a Rijndael block cipher to encrypt files, making it virtually impossible to decrypt the data for free.
As of now, there is no information regarding what method has been used to infect Magento servers, however, Magento has released a security update on Wednesday that includes a patch for cross-site scripting (XSS), code execution, brute force, insufficient data protection, and information disclosure issues. Magento also warned of a campaign that involves brute-forcing passwords to gain access to administration panels.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
Recent Posts
- Forecasting Future Outbreaks: A Behavioral and Predictive Approach to Proactive Cyber Risk Management
- Fault Lines in the AI Ecosystem: TrendAI™ State of AI Security Report
- The Industrialization of Botnets: Automation and Scale as a New Threat Infrastructure
- From Holiday Snap to Custom Scam in 30 Minutes: How AI Turns Public Photos Into Targeted Attacks
- From LinkedIn to Tailored Attack in 30 Minutes: How AI Accelerates Target Profiling for Cybercrime
Fault Lines in the AI Ecosystem: TrendAI™ State of AI Security Report
AI Security Starts Here: The Essentials for Every Organization
The AI-fication of Cyberthreats: Trend Micro Security Predictions for 2026
Stay Ahead of AI Threats: Secure LLM Applications With Trend Vision One